Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Merge branch 'ikev2-fragmentation' | Tobias Brunner | 2014-10-10 | 36 | -1211/+2658 | |
|\ | | | | | | | This adds support for IKEv2 fragmentation as per RFC 7383. | |||||
| * | testing: Add ikev2/net2net-fragmentation scenario | Tobias Brunner | 2014-10-10 | 9 | -0/+116 | |
| | | ||||||
| * | testing: Update ikev1/net2net-fragmentation scenario | Tobias Brunner | 2014-10-10 | 1 | -2/+2 | |
| | | ||||||
| * | message: Limit maximum number of IKEv2 fragments | Tobias Brunner | 2014-10-10 | 1 | -1/+11 | |
| | | | | | | | | | | | | | | | | The maximum for IKEv1 is already 255 due to the 8-bit fragment number. With an overhead of 17 bytes (x64) per fragment and a default maximum of 10000 bytes per packet the maximum memory required is 14 kB for a fragmented message. | |||||
| * | packet: Define a global default maximum size for IKE packets | Tobias Brunner | 2014-10-10 | 5 | -18/+9 | |
| | | ||||||
| * | message: Ensure a minimum fragment length | Tobias Brunner | 2014-10-10 | 1 | -8/+18 | |
| | | ||||||
| * | ikev2: Send retransmits using the latest known addresses | Tobias Brunner | 2014-10-10 | 1 | -1/+3 | |
| | | | | | | | | | | | | | | For instance, if a DPD exchange is initiated by the gateway when a mobile client is roaming and it then gets a new IP address and sends an address update via MOBIKE, the DPD retransmits would still be sent to the old address and the SA would eventually get closed. | |||||
| * | ikev2: Send and receive fragmented IKE messages | Tobias Brunner | 2014-10-10 | 1 | -44/+169 | |
| | | | | | | | | | | If a fragmented message is retransmitted only the first packet is passed to the alert() hook. | |||||
| * | ike: IKE_SA may fragment IKEv2 messages | Tobias Brunner | 2014-10-10 | 1 | -1/+1 | |
| | | ||||||
| * | ike: Do not cache MID of IKEv2 fragments | Tobias Brunner | 2014-10-10 | 1 | -2/+3 | |
| | | | | | | | | | | This fails if there are unencrypted payloads before an encrypted fragment payload in the first fragment. | |||||
| * | message: Fragment and reassemble IKEv2 messages | Tobias Brunner | 2014-10-10 | 2 | -133/+366 | |
| | | ||||||
| * | message: Handle encrypted fragment payload similar to the encrypted payload | Tobias Brunner | 2014-10-10 | 1 | -16/+91 | |
| | | ||||||
| * | ikev2: Add encrypted fragment payload | Tobias Brunner | 2014-10-10 | 5 | -12/+455 | |
| | | ||||||
| * | encrypted_payload: Encrypted payload can be constructed from plaintext | Tobias Brunner | 2014-10-10 | 2 | -0/+38 | |
| | | ||||||
| * | encrypted_payload: Expose generate() to generate the plaintext | Tobias Brunner | 2014-10-10 | 2 | -1/+17 | |
| | | ||||||
| * | encrypted_payload: Extract some utility functions | Tobias Brunner | 2014-10-10 | 1 | -74/+110 | |
| | | ||||||
| * | message: Split generate() in multiple functions | Tobias Brunner | 2014-10-10 | 1 | -67/+122 | |
| | | ||||||
| * | ikev2: Negotiate support for IKEv2 fragmentation | Tobias Brunner | 2014-10-10 | 2 | -1/+24 | |
| | | ||||||
| * | ikev2: Add notify for IKEv2 fragmentation | Tobias Brunner | 2014-10-10 | 2 | -7/+15 | |
| | | ||||||
| * | ikev1: Move defragmentation to message_t | Tobias Brunner | 2014-10-10 | 3 | -169/+240 | |
| | | ||||||
| * | ike: Move fragmentation to ike_sa_t | Tobias Brunner | 2014-10-10 | 3 | -62/+94 | |
| | | | | | | | | | | | | | | | | | | The message() hook on bus_t is now called exactly once before (plain) and once after fragmenting (!plain), not twice for the complete message and again for each individual fragment, as was the case in earlier iterations. For inbound messages the hook is called once for each fragment (!plain) and twice for the reassembled message. | |||||
| * | message: fragment() generates message and fragments and caches them | Tobias Brunner | 2014-10-10 | 3 | -58/+109 | |
| | | ||||||
| * | message: Make packet argument optional in generate() | Tobias Brunner | 2014-10-10 | 1 | -1/+4 | |
| | | ||||||
| * | ikev1: Move fragment generation to message_t | Tobias Brunner | 2014-10-10 | 5 | -139/+251 | |
| | | ||||||
| * | ike: Rename encryption_payload to encrypted_payload | Tobias Brunner | 2014-10-10 | 10 | -102/+98 | |
|/ | ||||||
* | ipsec: Remove unsupported listcards and rereadgroups commands | Tobias Brunner | 2014-10-08 | 1 | -10/+0 | |
| | ||||||
* | ipsec: Document missing commands | Tobias Brunner | 2014-10-08 | 1 | -1/+11 | |
| | ||||||
* | ipsec: Update usage output | Tobias Brunner | 2014-10-08 | 1 | -18/+17 | |
| | ||||||
* | ipsec: Remove duplicate check for internal commands | Tobias Brunner | 2014-10-08 | 1 | -4/+0 | |
| | ||||||
* | ipsec: Only set PATH if it is not already set | Tobias Brunner | 2014-10-08 | 1 | -1/+1 | |
| | | | | | | | | | | The comment indicated this but it was always set anyway. All internal commands are called via their absolute paths, so the script only uses PATH for the uname command, but if that is not located in one of the configured directories the script will fail. Also, since the internal commands are called via their absolute paths there is no need to add the directories to PATH. | |||||
* | ikev1: Fix handling of UNITY_LOAD_BALANCE | Tobias Brunner | 2014-10-07 | 1 | -3/+3 | |
| | | | | | The re-authentication is now handled within the original IKE_SA if it has not yet been established, so we don't want to destroy it. | |||||
* | ikev1: Don't queue more than one mode config or XAuth task | Tobias Brunner | 2014-10-07 | 1 | -7/+22 | |
| | | | | | | | | At the time we reset an IKE_SA (e.g. when re-authenticating a not yet established SA due to a roaming event) such tasks might already be queued by one of the phase 1 tasks. If the SA is initiated again another task will get queued by the phase 1 task. This results in e.g. multiple mode config requests, which most gateways will have problems with. | |||||
* | testing: Don't check for the actual number of SWID tags in PDP scenarios | Tobias Brunner | 2014-10-07 | 2 | -8/+8 | |
| | | | | | The number of SWID tags varies depending on the base image, but lets assume the number is in the hundreds. | |||||
* | testing: Make TNC scenarios agnostic to the actual Debian version | Tobias Brunner | 2014-10-07 | 18 | -45/+52 | |
| | | | | | The scenarios will work with new or old base images as long as the version in use is included as product in the master data (src/libimcv/imv/data.sql). | |||||
* | testing: Make TKM related build recipes future-proof | Tobias Brunner | 2014-10-07 | 6 | -24/+36 | |
| | | | | | | | | The tkm scenarios recently failed due to a segmentation fault on my host because I had an old build of the tkm library already built in the build directory. Because the stamp file was not versioned the new release was never checked out or built and charon-tkm was linked against the old version causing a segmentation fault during key derivation. | |||||
* | version bump to 5.2.1rc1 | Andreas Steffen | 2014-10-06 | 1 | -1/+1 | |
| | ||||||
* | Merge branch 'ext-auth'5.2.1dr1 | Martin Willi | 2014-10-06 | 18 | -249/+1644 | |
|\ | | | | | | | | | | | Integrates the ext-auth plugin by Vyronas Tsingaras. The new child process abstraction simplifies implementation in both the new ext-auth and the existing updown plugin, and makes them available on the Windows platform. | |||||
| * | NEWS: Mention new ext-auth plugin | Martin Willi | 2014-10-06 | 1 | -0/+3 | |
| | | ||||||
| * | ext-auth: Add an ext-auth plugin invoking an external authorization script | Martin Willi | 2014-10-06 | 9 | -0/+512 | |
| | | | | | | | | Original patch courtesy of Vyronas Tsingaras. | |||||
| * | updown: Use process abstraction to invoke updown script | Martin Willi | 2014-10-06 | 1 | -246/+215 | |
| | | ||||||
| * | process: Add a wrapper to invoke a command under the system default shell | Martin Willi | 2014-10-06 | 3 | -0/+110 | |
| | | ||||||
| * | process: Port child process spawning to the Windows platform | Martin Willi | 2014-10-06 | 2 | -1/+315 | |
| | | ||||||
| * | process: Provide an abstraction to spawn child processes with redirected I/O | Martin Willi | 2014-10-06 | 7 | -3/+490 | |
|/ | ||||||
* | testing: Updated certificates and keys in sql scenarios | Andreas Steffen | 2014-10-06 | 35 | -121/+121 | |
| | ||||||
* | Added IF-M Segmentation support to NEWS | Andreas Steffen | 2014-10-05 | 1 | -0/+5 | |
| | ||||||
* | Incremental parsing fixes | Andreas Steffen | 2014-10-05 | 2 | -14/+9 | |
| | ||||||
* | Updated revoked certificate in ikev2/ocsp-revoked scenario | Andreas Steffen | 2014-10-05 | 2 | -42/+42 | |
| | ||||||
* | The critical-extension scenarios need the old private keys | Andreas Steffen | 2014-10-05 | 4 | -0/+108 | |
| | ||||||
* | Added add_segment() method to TCG/PTS attributes | Andreas Steffen | 2014-10-05 | 18 | -26/+157 | |
| | ||||||
* | Added add_segment() method to TCG/SEG attributes | Andreas Steffen | 2014-10-05 | 3 | -25/+49 | |
| |